Features

CIO Jan/Feb digital issue cover
data protection

crm chief product officer primary

IT Career Roadmap: Chief product officer

Being a chief product officer requires many skills, but none is more important than the ability to unify disparate teams and motivate them to create an incredible product. Here is one CPO's journey and what it took for him to succeed...

android for work

The essential Android business apps

Your phone is now your digital briefcase, your ever-present business companion.

1 home network

6 tips to protect your home network

Remote workers who use their home office as their primary office are arguably at even more of a risk since they may be exposing corporate assets as well as personal assets. Untangle recommends the following best practices to secure...

tech roles boom or bust

5 tech jobs that will boom (and 2 that will bust) in 2017

The technology market is regularly evolving and so are the jobs and skills necessary to keep things moving forward. We asked an expert what the year ahead holds for IT professionals.

01 branches

How to keep branch offices as secure as corporate HQ

Satellite worksites can cause big headaches for tech pros tasked with keeping company assets secure. We talked to a number of tech pros to find out more about the dangers—and the solutions.

cloud washing2

10 new AWS cloud services you never expected

From data scooping to facial recognition, Amazon’s latest additions give devs new, wide-ranging powers in the cloud

emm predictions 2017 mdm

6 EMM predictions for 2017

Enterprise mobility management trends will be driven by growing complexities in hardware and software, concerns about privacy and a push for mobile management compliance in the workplace.

Computerworld slideshow, The Evolution of the MacBook [slide 1] - cover

The Evolution of the MacBook

The MacBook turned 25 in late 2016. From the early PowerBook to the latest MacBook Pro, we explore the evolution of Apple's laptops and the innovative changes each generation brought.

texas hold em ai primary

Can AI beat the best at Texas hold'em?

Heads-up no-limit Texas hold'em may be the final frontier in the battle of man vs. machine. Artificial intelligence developed by a Carnegie Mellon University professor and a Ph.D student is taking on four of the top pros in the world...

01 fortified

How fortified is your SAP against security breaches?

Can you even tell if a breach has occurred? Have you inventoried its vulnerabilities - and taken steps to prevent, for example, a $22 million per minute loss due to a SAP breach? Ask yourself these 10 questions to find out if your SAP...

intel computestick sizecomparison rpi2

Mini PC invasion: These radically tiny computers fit in the palm of your hand

Some of today's 'desktop' mini-PCs make laptops seem downright bulky in comparison.

Concepts key to simpler C++

Bjarne Stroustrup mines generic programming for a better C++

The creator of C++ sees concepts in generic programming as key to more efficient, reliable code

build freelance tech worker team teambuilding

6 tips to find and retain freelance tech workers

Once you find reliable freelancers, you won't want to stop there. Follow these five tips to help build and retain a stable of freelance workers.

video

6 startups from CES to watch in 2017

6 innovative new companies showed off their products in the Eureka Park section of CES 2017.

google photos drive

Choosing between Google Photos or Google Drive for image backups

Google Photos and Drive complement each other in some ways and offer stark differences in others.

beach tide summer sand

Passwords: A long goodbye

There is no debate about the reality that passwords are a “fundamentally broken” method of authentication. But it is still expected to take time – likely years – for the replacement model to become mainstream.

CES

6 startups from CES to watch in 2017 (with video)

The Eureka Park area at the CES trade show offered startups a chance to show what they can do. We interview six hopeful entrepreneurs about their products.

01 holes

Tips on where to start in managing risk

What is risk management? Anytime you have something of value (like a corporate network, a website, or a mobile application), there will be risk to manage in order to protect it. Traditional approaches and controls are no longer good...

Load More